oss-sec mailing list archives
Re: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability
From: Daniel Beck <ml () beckweb net>
Date: Thu, 25 Jan 2018 16:59:35 +0100
On 11. Dec 2017, at 15:27, Daniel Beck <ml () beckweb net> wrote: SECURITY-663 Users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
CVE-2017-1000505
Current thread:
- Re: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability Daniel Beck (Jan 25)